[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <bfc84e1c-1a40-618a-fd7e-833c5a20063c@redhat.com>
Date: Tue, 17 Mar 2020 14:09:53 -0400
From: Waiman Long <longman@...hat.com>
To: David Howells <dhowells@...hat.com>
Cc: Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com>,
James Morris <jmorris@...ei.org>,
"Serge E. Hallyn" <serge@...lyn.com>,
Mimi Zohar <zohar@...ux.ibm.com>, keyrings@...r.kernel.org,
linux-kernel@...r.kernel.org,
linux-security-module@...r.kernel.org,
linux-integrity@...r.kernel.org,
Sumit Garg <sumit.garg@...aro.org>,
Jerry Snitselaar <jsnitsel@...hat.com>,
Roberto Sassu <roberto.sassu@...wei.com>,
Eric Biggers <ebiggers@...gle.com>,
Chris von Recklinghausen <crecklin@...hat.com>
Subject: Re: [PATCH v3 1/3] KEYS: Don't write out to userspace while holding
key semaphore
On 3/16/20 7:50 AM, David Howells wrote:
> Waiman Long <longman@...hat.com> wrote:
>
>> include/linux/key-type.h | 2 +-
>> security/keys/big_key.c | 11 ++---
>> security/keys/encrypted-keys/encrypted.c | 7 ++-
>> security/keys/keyctl.c | 57 +++++++++++++++++++----
>> security/keys/keyring.c | 6 +--
>> security/keys/request_key_auth.c | 7 ++-
>> security/keys/trusted-keys/trusted_tpm1.c | 14 +-----
>> security/keys/user_defined.c | 5 +-
>> ...
>> - long (*read)(const struct key *key, char __user *buffer, size_t buflen);
>> + long (*read)(const struct key *key, char *buffer, size_t buflen);
> Note that there are read functions outside of security/keys/ that also need
> fixing - dns_resolver_read() and rxrpc_read().
>
> David
Yes, I am going to fix that. Sorry for the delay as I am juggling a few
different tasks.
Cheers,
Longman
Powered by blists - more mailing lists